live.darkemud.com
Connection Banner:
Server URLs
- Telnet: telnet://live.darkemud.com:5559
Server Info
Server Location: 🇺🇸 United States (GeoIP)
Telnet Fingerprint
This fingerprint is shared by 26 other servers.
Options requested from client: NAWS, TTYPE
The complete JSON record collected during the scan, including Telnet negotiation results and any MSSP metadata.
Show JSON
{
"server-probe": {
"fingerprint": "c405afe101fc3e8c",
"fingerprint-data": {
"offered-options": [],
"probed-protocol": "server",
"refused-options": [],
"requested-options": [
"NAWS",
"TTYPE"
],
"scan-type": "quick"
},
"session_data": {
"banner_after_return": "\r\nInvalid entry. Please try again.\r\n",
"banner_before_return": "\r\n _-\\_/_,,__/--)_./-\\__/_),;\\__/_\\,,(__/`\\_(\\__/``.\r\n \\_./ / `\\\r\n `\\ /` /'\r\n \\ `}\r\n /' ./~~\\. `\\_ , .\r\n [_[[]]_] ;'\\./\r\n [[_[]_]] [ ** ] , ..;%[]_]]\r\n [ ] [ ] ., `/ ]\r\n [ /* ] [ ] `[ *\\ ]\r\n [ \\/ ]]__]]__]][_[]_][[__[[__[[[ \\/ ]\r\n [ ] [ ]\r\n [ __ ] * /)][(\\ * [ ]\r\n [ ] ` (] [) ` [ - ]\r\n ,.,;,.[.;,.],..,;,.,(] [);,.,..,,;[.,..];,..,.\r\n D a r k e M U D\r\n\r\n \t\t- Art by Jinx\r\n\r\n Admins: MacTORG Cyric Din\r\n Test Admins: Cyric MacTORG\r\n Test Wizards: (none)\r\n Retired Admins: Cerberus Helios Madoc\r\n Mallorean Nathan Nevin Shadowraith\r\n \r\n ==== help policy ==== ==== help rules ====\r\n\r\n (C) Copyright 2019 - DarkeMUD Administration\r\n Unauthorized distribution is prohibited.\r\n Site Provider - MacTORG\r\n\r\n Driver: MudOS v22.1b22 Mudlib: DarkeLIB 2.0\r\n\r\nLogin (enter your handle for new players): ",
"dsr_replies": 0,
"dsr_requests": 0,
"encoding": "ascii",
"option_states": {
"server_offered": {},
"server_requested": {
"NAWS": true,
"TTYPE": true
}
},
"scan_type": "quick",
"timing": {
"probe": 0.0,
"total": 5.53812313079834
}
}
},
"sessions": [
{
"connected": "2026-04-07T06:53:41.376914+00:00",
"host": "live.darkemud.com",
"ip": "75.174.42.53",
"port": 5559
}
]
}
Connection Log
Debug-level log of the Telnet negotiation session, showing each IAC (Interpret As Command) exchange between client and server.
Generated by telnetlib3-fingerprint
telnetlib3-fingerprint --loglevel=debug live.darkemud.com 5559
Show Logfile
DEBUG client.py:1200 Fingerprint client: host=live.darkemud.com port=5559
INFO client_base.py:190 Connected to <Peer 75.174.42.53 5559>
DEBUG stream_writer.py:3384 pending_option[WILL + MSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSP
DEBUG stream_writer.py:3384 pending_option[WILL + MSDP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSDP
DEBUG stream_writer.py:3384 pending_option[WILL + MSSP] = True
DEBUG stream_writer.py:1024 send IAC WILL MSSP
DEBUG stream_writer.py:3384 pending_option[WILL + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC WILL AARDWOLF
DEBUG stream_writer.py:3384 pending_option[WILL + ATCP] = True
DEBUG stream_writer.py:1024 send IAC WILL ATCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[WILL + MXP] = True
DEBUG stream_writer.py:1024 send IAC WILL MXP
DEBUG stream_writer.py:3384 pending_option[WILL + ZMP] = True
DEBUG stream_writer.py:1024 send IAC WILL ZMP
DEBUG stream_writer.py:3384 pending_option[WILL + GMCP] = True
DEBUG stream_writer.py:1024 send IAC WILL GMCP
DEBUG stream_writer.py:3384 pending_option[WILL + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC WILL MCCP2_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSP
DEBUG stream_writer.py:3384 pending_option[DO + MSDP] = True
DEBUG stream_writer.py:1024 send IAC DO MSDP
DEBUG stream_writer.py:3384 pending_option[DO + MSSP] = True
DEBUG stream_writer.py:1024 send IAC DO MSSP
DEBUG stream_writer.py:3384 pending_option[DO + AARDWOLF] = True
DEBUG stream_writer.py:1024 send IAC DO AARDWOLF
DEBUG stream_writer.py:3384 pending_option[DO + ATCP] = True
DEBUG stream_writer.py:1024 send IAC DO ATCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP3_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP3_COMPRESS
DEBUG stream_writer.py:3384 pending_option[DO + MXP] = True
DEBUG stream_writer.py:1024 send IAC DO MXP
DEBUG stream_writer.py:3384 pending_option[DO + ZMP] = True
DEBUG stream_writer.py:1024 send IAC DO ZMP
DEBUG stream_writer.py:3384 pending_option[DO + GMCP] = True
DEBUG stream_writer.py:1024 send IAC DO GMCP
DEBUG stream_writer.py:3384 pending_option[DO + MCCP2_COMPRESS] = True
DEBUG stream_writer.py:1024 send IAC DO MCCP2_COMPRESS
DEBUG stream_writer.py:773 recv IAC DO TTYPE
DEBUG stream_writer.py:1887 handle_do(TTYPE)
DEBUG stream_writer.py:3384 pending_option[WILL + TTYPE] = True
DEBUG stream_writer.py:1024 send IAC WILL TTYPE
DEBUG stream_writer.py:3384 pending_option[SB + TTYPE] = True
DEBUG stream_writer.py:3384 local_option[TTYPE] = True
DEBUG stream_writer.py:3384 pending_option[WILL + TTYPE] = False
DEBUG stream_writer.py:773 recv IAC DO NAWS
DEBUG stream_writer.py:1887 handle_do(NAWS)
DEBUG stream_writer.py:3384 pending_option[WILL + NAWS] = True
DEBUG stream_writer.py:1024 send IAC WILL NAWS
DEBUG stream_writer.py:2507 send IAC SB NAWS (rows=25, cols=80) IAC SE
DEBUG stream_writer.py:3384 local_option[NAWS] = True
DEBUG stream_writer.py:3384 pending_option[WILL + NAWS] = False
DEBUG stream_writer.py:767 begin sub-negotiation SB TTYPE
DEBUG stream_writer.py:754 sub-negotiation cmd TTYPE SE completion byte
DEBUG stream_writer.py:3384 pending_option[SB + TTYPE] = False
DEBUG stream_writer.py:2404 recv TTYPE SEND: b''
DEBUG stream_writer.py:2416 send IAC SB TTYPE IS b'xterm-256color' IAC SE
DEBUG client_base.py:534 negotiation failed after 4.00s.
DEBUG client_base.py:540 failed-reply: 'WILL MSP, WILL MSDP, WILL MSSP, WILL AARDWOLF, WILL ATCP, WILL MCCP3_COMPRESS, WILL MXP,
WILL ZMP, WILL GMCP, WILL MCCP2_COMPRESS, DO MSP, DO MSDP, DO MSSP, DO AARDWOLF, DO ATCP, DO MCCP3_COMPRESS, DO MXP, DO ZMP,
DO GMCP, DO MCCP2_COMPRESS'
DEBUG client_base.py:93 EOF from server, closing.
INFO client_base.py:122 Connection closed to <Peer 75.174.42.53 5559>
DEBUG fingerprinting.py:849 connection for server fingerprint c405afe101fc3e8c